CVE-2005-2878

Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:mailutils:0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112785181316043&w=2 - () http://marc.info/?l=bugtraq&m=112785181316043&w=2 -
References () http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407 - Patch () http://savannah.gnu.org/patch/index.php?func=detailitem&item_id=4407 - Patch
References () http://secunia.com/advisories/16783 - () http://secunia.com/advisories/16783 -
References () http://secunia.com/advisories/17020 - () http://secunia.com/advisories/17020 -
References () http://www.debian.org/security/2005/dsa-841 - () http://www.debian.org/security/2005/dsa-841 -
References () http://www.gentoo.org/security/en/glsa/glsa-200509-10.xml - () http://www.gentoo.org/security/en/glsa/glsa-200509-10.xml -
References () http://www.idefense.com/application/poi/display?id=303&type=vulnerabilities&flashstatus=true - Exploit, Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=303&type=vulnerabilities&flashstatus=true - Exploit, Patch, Vendor Advisory
References () http://www.rosiello.org/archivio/imap4d_FreeBSD_exploit.c - () http://www.rosiello.org/archivio/imap4d_FreeBSD_exploit.c -
References () http://www.securityfocus.com/bid/14794 - () http://www.securityfocus.com/bid/14794 -

Information

Published : 2005-09-13 23:03

Updated : 2025-04-03 01:03


NVD link : CVE-2005-2878

Mitre link : CVE-2005-2878

CVE.ORG link : CVE-2005-2878


JSON object : View

Products Affected

gnu

  • mailutils